
Cloud Vulnerability DB
A community-led vulnerabilities database
Apache Geode versions up to 1.12.4 and 1.13.4 were found to contain a log file redaction vulnerability that affects sensitive information when using values that begin with characters other than letters or numbers for passwords and security properties with specific prefixes including 'sysprop-', 'javax.net.ssl', or 'security-'. The vulnerability was discovered by Aaron Lindsey and tracked as GEODE-9354 (Openwall Report).
The vulnerability is classified as CWE-532, which relates to information exposure through log files. The issue specifically affects the log file redaction mechanism in Apache Geode when handling passwords and security properties that begin with non-alphanumeric characters (NVD Report).
This vulnerability could lead to the exposure of sensitive information in log files, particularly affecting passwords and security properties that begin with non-alphanumeric characters. The exposure of such sensitive information could potentially compromise system security (Openwall Report).
The vulnerability has been addressed in Apache Geode versions after 1.12.4 and 1.13.4. Users are recommended to upgrade to the latest version to ensure proper log file redaction of sensitive information (Openwall Report).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."